Azure administrators   need to have Global Administrator role to work with MFA, particularly to import and activate OATH tokens. Sometimes they want to delegate this task to service desk   team, but to achieve this they need to delegate GA  rights too. In this article, we would like to talk about a couple of solutions  that would be usefull  for administrators in managing MFA.
Definitely CSV file with tokens  can be uploaded only with Global Admin role and there are no ways around it. 
So, Global Administrator uploads the CSV file and activates tokens for all users. Activating tokens at once for all users can be done using our bulk activation tool. After this has been done for all users, there are some workarounds to delegate the remaining tasks to other type of tenant administators.
Below are the methods by which the administrator can partially delegate the rights to enable / disable MFA for users.
Method 1. Through Conditional Access
Administrator creates Conditional Access rule with MFA Enforced Group, delegates User Administrator role to service desk team.
This role is enough to be able to add a user to the group to activate MFA. If necessary, they can exclude user  from this group and thus disable MFA for this user.

Method 2. Enable/Disable MFA for each user with Power Shell
Administrator delegates Authentication Administrator  or  Privileged Authentication Administrator  roles to service desk  team.
PS C:> Connect-MsolService
This  cmdlet attempts to initiate a connection to Azure Active Directory.
PS C:> Get-MsolUser  |  fl UserPrincipalName, StrongAuthenticationRequirements
This cmdlet with pipeline shows  status of MFA for all users:
StrongAuthenticationRequirements  : {}   - MFA is disabled
StrongAuthenticationRequirements  : {Microsoft.Online.Administration .StrongAuthenticationRequirement}- MFA is enabled
To enable MFA :
PS C:> $mf= New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
PS C:> $mf.RelyingParty = "*"
PS C:> $mfa = @($mf)
PS C:> Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $mfa
To disable MFA :
PS C:> Get-MsolUser -UserPrincipalName  [email protected] | Set-MsolUser -StrongAuthenticationRequirements @()
integration guides
Subscribe to our mailing list
Want to keep up-to-date with the latest Token2 news, projects and events? Join our mailing list!